COMPSAC 2016: The 40th IEEE Computer Society International Conference on Computers, Software & Applications
Atlanta, Georgia, USA - June 10-14, 2016
Connected World: New Challenges for Data, Systems & Applications
|2016 COMPSAC Symposia|
STPSA 2016: The 11th IEEE International Workshop on Security, Trust, and Privacy for Software Applications
Mohammad Zulkernine, Queen’s University, Canada
H. Takabi, University of North Texas, USA
Sheikh Iqbal Ahamed, Marquette University, USA
Publicity & Proceedings Chair
Mohammad Ashiqur Rahman, Tennessee Tech University, USA
Goals of the Workshop
This workshop will bring researchers from academia and industry to discuss methods and tools to
achieve security, trust, and privacy goals of both pervasive and pervasive software applications.
This workshop will focus on techniques, experiences and lessons learned with respect to the state
of art for the security, trust, and privacy aspects of both pervasive and non-pervasive software
applications along with some open issues.
Theme of the Workshop
Information security has become a major concern for both pervasive and non-pervasive software applications. Software systems must be engineered with reliable protection mechanisms with respect to security, privacy, and trust, while still delivering the expected value of the software to their customers. The traditional approaches to secure a system (e.g., IDS, firewalls) are no longer sufficient to address many security, trust, and privacy (STP) issues. These issues should be addressed by building more effective STP-aware software applications. The principal obstacle in developing STP-aware software is that current software specification, design, implementation, and testing practices do not include adequate methods and tools to achieve security, trust, and privacy goals.
As most systems now are Internet-based, the number of attackers is increased dramatically and threat scenarios have changed. Traditional security measures do not fit well for the software of pervasive applications. Since location and contexts are key attributes of pervasive applications, the privacy issues need to be handled in a novel manner than traditional software applications. The devices in pervasive computing leave and join in ad hoc manner in the pervasive network. These create a need for new trust models for pervasive computing applications. In this workshop, we will also welcome papers on the challenges and requirements of security, privacy, and trust for pervasive software applications.
Scope of the Workshop
Topics of interest include, but are not limited to, the following:
* Security, trust, and privacy specific software development practices
* Security, trust, and privacy requirements elicitation and specification
* Models and languages for STP-aware software specification and design
* Architecture for STP-aware software development
* STP challenges for pervasive software applications
* Testing security, trust, and privacy properties of both pervasive and non-pervasive software
* STP management and usability issues in software applications
* User interfaces for STP-aware pervasive and non pervasive software
* Software reengineering for security, trust, and privacy for both pervasive and non pervasive applications
* Tradeoffs among security, privacy, trust, and other criteria
* STP challenges in e-services, e.g. e-health, e-government, e-banking, e-commerce, e-marketing and other web-based and pervasive applications
* STP challenges in mobile software applications
* STP issues in sensor based software applications
* User interfaces for secure and privacy-aware pervasive computing applications
* STP-aware service discovery mechanisms for pervasive computing environments
* Models for ensuring security, trust, and privacy in pervasive software applications
* STP issues for handheld device software applications
* Teaching STP-aware software development
* Experience reports on developing STP-aware software
The length of a camera ready paper will be limited to 6 pages (IEEE Proceedings style) with up to 2 additional pages (with charges for each additional page) printed on 10-12 point fonts. Authors must follow IEEE CS Press Proceedings Author Guidelines to prepare papers. At least one of the authors of each accepted paper is required to pay full registration fee and present the paper at the workshop in person.
Authors: Paper Submission
Please click this link to go to the main conference/symposia paper submission system.
Workshop paper submission links are available on the individual workshop web pages.
Program Committee Chairs: email@example.com
November 30, 2015: Main conference abstracts due (optional)
February 29, 2016: Main conference paper notifications
March 7, 2016: Doctoral Symposium papers & Posters due
March 15, 2016: Doctoral Symposium & Poster notifications
March 21, 2016: Doctoral Symposium & Poster camera ready & registration due
March 28, 2016: Workshop & Fast Abstract paper notifications
April 7, 2016: Camera ready and registration due